/external/wpa_supplicant_8/src/rsn_supp/ |
pmksa_cache.h | 19 size_t pmk_len; member in struct:rsn_pmksa_cache_entry 59 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 71 const u8 *pmk, size_t pmk_len); 107 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 128 const u8 *pmk, size_t pmk_len)
|
pmksa_cache.c | 111 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 127 pmksa_cache_add(struct rsn_pmksa_cache *pmksa, const u8 *pmk, size_t pmk_len, 134 if (pmk_len > PMK_LEN_MAX) 143 os_memcpy(entry->pmk, pmk, pmk_len); 144 entry->pmk_len = pmk_len; 152 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 168 if (pos->pmk_len == pmk_len & [all...] |
preauth.c | 78 u8 pmk[PMK_LEN]; 81 int res, pmk_len; local 82 pmk_len = PMK_LEN; 83 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 90 pmk_len = 16; 94 pmk, pmk_len); 95 sm->pmk_len = pmk_len; 96 pmksa_cache_add(sm->pmksa, pmk, pmk_len, NULL [all...] |
wpa.c | 172 if (wpa_sm_key_mgmt_set_pmk(sm, sm->pmk, sm->pmk_len)) 209 sm->pmk, sm->pmk_len); 215 int res, pmk_len; local 218 pmk_len = PMK_LEN_SUITE_B_192; 220 pmk_len = PMK_LEN; 221 res = eapol_sm_get_key(sm->eapol, sm->pmk, pmk_len); 223 if (pmk_len == PMK_LEN) { 229 pmk_len = 16 [all...] |
wpa.h | 79 int (*key_mgmt_set_pmk)(void *ctx, const u8 *pmk, size_t pmk_len); 116 void wpa_sm_set_pmk(struct wpa_sm *sm, const u8 *pmk, size_t pmk_len, 184 size_t pmk_len, const u8 *pmkid,
|
wpa_i.h | 23 size_t pmk_len; member in struct:wpa_sm 115 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */ 117 u8 pmk_r0[PMK_LEN]; 119 u8 pmk_r1[PMK_LEN]; 349 const u8 *pmk, size_t pmk_len) 353 return sm->ctx->key_mgmt_set_pmk(sm->ctx->ctx, pmk, pmk_len);
|
/external/wpa_supplicant_8/src/ap/ |
pmksa_cache_auth.h | 21 size_t pmk_len; member in struct:rsn_pmksa_cache_entry 51 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
|
pmksa_cache_auth.c | 262 * @pmk_len: PMK length in bytes, usually PMK_LEN (32) 280 const u8 *pmk, size_t pmk_len, const u8 *pmkid, 288 if (pmk_len > PMK_LEN_MAX) 297 os_memcpy(entry->pmk, pmk, pmk_len); 298 entry->pmk_len = pmk_len; 306 rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid, 349 os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len); 350 entry->pmk_len = old_entry->pmk_len [all...] |
wpa_auth.c | 47 const u8 *pmk, unsigned int pmk_len, 831 unsigned int pmk_len; local 839 pmk_len = PMK_LEN; 842 pmk_len = sm->pmk_len; 845 wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK); 1915 unsigned int pmk_len; local 2050 unsigned int pmk_len; local [all...] |
wpa_auth_i.h | 64 unsigned int pmk_len; member in struct:wpa_state_machine 116 u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */
|
wpa_auth.h | 66 FT_R1KH_ID_LEN + ETH_ALEN + PMK_LEN + \ 78 u8 pmk_r1[PMK_LEN]; 86 WPA_PMK_NAME_LEN + PMK_LEN + \ 101 u8 pmk_r1[PMK_LEN]; 291 unsigned int pmk_len,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 272 int res, pmk_len; local 273 u8 pmk[PMK_LEN]; 305 pmk_len = PMK_LEN; 308 u8 buf[2 * PMK_LEN]; 311 res = eapol_sm_get_key(eapol, buf, 2 * PMK_LEN); 313 os_memcpy(pmk, buf + PMK_LEN, PMK_LEN); 320 res = eapol_sm_get_key(eapol, pmk, PMK_LEN); 327 pmk_len = 16 [all...] |
/external/wpa_supplicant_8/src/common/ |
wpa_common.c | 121 * @pmk_len: Length of PMK 141 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 175 sha384_prf(pmk, pmk_len, label, data, sizeof(data), 181 sha256_prf(pmk, pmk_len, label, data, sizeof(data), 185 sha1_prf(pmk, pmk_len, label, data, sizeof(data), tmp, ptk_len); 191 wpa_hexdump_key(MSG_DEBUG, "WPA: PMK", pmk, pmk_len); 887 os_memcpy(pmk_r0, r0_key_data, PMK_LEN); 894 addr[1] = r0_key_data + PMK_LEN; 951 sha256_prf(pmk_r0, PMK_LEN, "FT-R1", buf, pos - buf, pmk_r1, PMK_LEN); [all...] |
wpa_common.h | 14 #define PMK_LEN 32 339 int wpa_pmk_to_ptk(const u8 *pmk, size_t pmk_len, const char *label, 383 void rsn_pmkid(const u8 *pmk, size_t pmk_len, const u8 *aa, const u8 *spa,
|